answersLogoWhite

0

TTL stands for "Time To Live". This is a piece of data in a network packet that specifies how many routers the packet can pass through before the packet expires and is thrown away.

Every router that the packet travels through subtracts one from the TTL counter. When it reaches zero, the packet expires. The router will drop the packet, and then send a message back to the computer that sent the packet telling it that the packet has expired.

The purpose of the TTL counter is to make routing loops less dangerous. Let me explain....

Routers are devices that look at an incoming data packet and decide where to send it to get it one step closer to its destination. It's possible for one or more routers to be configured such that router A sends the packet to router B, which sends it to router C, which sends it to router A, which then starts it over again. Without the TTL counter, this packet (and any subsequent packet sent to the same destination) would circulate endlessly, taking up bandwidth until someone fixes the routing loop.

However, with TTL, each router subtracts one from the TTL counter until eventually the counter hits zero and the packet goes away, giving someone time to fix the problem before the links are so congested with looping packets that it's no longer possible to talk to the router.

TTL can affect network security in a couple of ways.

Most operating systems set the TTL counter to 64 or 128, which is a pretty large number that will guarantee your packet can get across the internet.

To improve your network security, you can set your TTL counter to a low number. If your internal network is only four routers wide, you can set your TTL to 4. This will ensure that any packets generated on your network will not travel very far beyond your internal network.

An attacker can also use the TTL feature to probe your network for the existence and address of your routers. This feature is used by the "traceroute" or "tracert" utility. It works by sending out a packet with a TTL of 1. The first router that the packet encounters will decrement the TTL to 0, drop the packet, then send a message to the traceroute program telling it that the packet expired. By looking at the source address of this packet, traceroute knows the address of the first router. Next traceroute sends a packet with a TTL of 2, which causes the packet to expire at the second router, which sends a message back to traceroute and exposing its address. And so on.

Once an attacker knows the addresses of your routers, he or she can start working on compromising them, which can cause you no end of security problems.

The solution is to prevent these packets from reaching your routers by using a firewall to block them.

HTH,

Gdunge

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Ethic of hacker?

The code of ethics of a hacker is very simple. "Do no harm."


What is the Importance of network security in business?

Network security is an important aspect of system administration. The article focuses on the purpose of network security, the kind of threats that it faces and the implementation of a security strategy.


Can Movie Star Planet hacker download harm your computer?

2was


What is a hacker who seeks to cause harm to a lot of people?

mrs. muir


What information do you find from hacking someone's computer?

You would find any and all information stored in their computer, depending on how good a hacker you are.


What is the definition of a hacker?

A hacker is a programmer who enjoys the challenge of breaking into other computers but does no harm, true hackers have a code of ethics and look down upon crackers.


What does a computer hacker do?

A hacker is a programmer who enjoys the challenge of breaking into other computers but does no harm, true hackers have a code of ethics and look down upon crackers.


Is it secure to use yoville hacker v 1.2 does it harm your computer if you used it?

yes it is secure


Does network security training do more harm than good cause you cannot talk about protection without going through the attacks?

No, absolutely not. You can talk about the attacks, but unless someone knows the specifics and how to implement it, just talking about it won't harm anything.


What is mean by security?

Security means feeling safe. It is a feeling that you are free from harm and danger.


A person who breaks into computer systems or software without permissin and with intent to do harm?

The person who breaks into a computer system should be called a hacker. If he does with permission, he's a blackhat hacker, in contrary is a whitehat. The person who breaks into a software is a cracker.


Are room invasions a significant security threat?

Yes, room invasions can pose a significant security threat as they can lead to theft, vandalism, or harm to occupants. It is important to ensure proper security measures are in place to prevent unauthorized entry into rooms or buildings.